FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2005-2095

This CVE name corresponds to:

Entered Topic
2005-09-17 squirrelmail -- _$POST variable handling allows for various attacks

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2005-2095
Phase Assigned(20050630)

Description

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

References

Source Reference
BUGTRAQ 20050714 SquirrelMail Arbitrary Variable Overwriting Vulnerability
BUGTRAQ 20050714 [SM-ANNOUNCE] Patch available for CAN-2005-2095
MISC http://www.gulftech.org/?node=research&article_id=00090-07142005
BUGTRAQ 20050714 [SM-ANNOUNCE] Patch available for CAN-2005-2095
CONFIRM http://www.squirrelmail.org/security/issue/2005-07-13
APPLE APPLE-SA-2005-08-15
APPLE APPLE-SA-2005-08-17
DEBIAN DSA-756
FEDORA FLSA:163047
REDHAT RHSA-2005:595
SUSE SUSE-SR:2005:018
BID 14254
OVAL oval:org.mitre.oval:def:10500
XF squirrelmail-set-post-variable(21359)